Stay Ahead Of Vulnerabilities With Dynamic Inventory Of Network Device Configurations